April 10, 2021

Black Hat attack aspect

What Black Hat attack aspect or characteristic makes the hacks very hard to detect and trace back?
April 10, 2021

Hate Crime

Develop your arguments by analyzing at least two pieces of media content (e.g., article, news clip) covering bias-motivated violence against a certain population (e.g., AAPI community, […]
April 10, 2021

information security strategies

How does BYOD popularity in computing domains affect information security strategies?
April 10, 2021

tenants of information security

What are the three tenants of information security and what are their significance?
April 10, 2021

journalism

WA5: Write a Basic News Story with an Expert Source and Data Source Find an expert source to interview for a news story you find interesting. […]
April 10, 2021

targeted, adversarial, infrastructure and capability attacks

What is the difference between targeted, adversarial, infrastructure and capability attacks?
April 10, 2021

Organisation culture

Describe a work experience* you have/had, including your role and tasks. What skills, knowledge or capacities do you need to conduct your tasks? Describe the main […]
April 10, 2021

motivations driving cyber security defense

Name three motivations driving cyber security defense efforts in today’s highly inter-connected world.
April 10, 2021

Movie Review

On your own, you will find and watch a movie that relates to the topic of Staffing/Hiring. The movie is Charlie and the Chocolate Factory (2005) […]
My Account